{"api_version":"1","generated_at":"2026-04-14T06:56:01+00:00","cve":"CVE-2020-25260","urls":{"html":"https://cve.report/CVE-2020-25260","api":"https://cve.report/api/cve/CVE-2020-25260.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-25260","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-25260"},"summary":{"title":"CVE-2020-25260","description":"An issue was discovered in Hyland OnBase 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. It allows remote attackers to execute arbitrary code because of unsafe JSON deserialization.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-09-11 03:15:00","updated_at":"2022-06-30 16:25:00"},"problem_types":["CWE-502"],"metrics":[],"references":[{"url":"https://seclists.org/fulldisclosure/2020/Sep/22","name":"https://seclists.org/fulldisclosure/2020/Sep/22","refsource":"MISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: Hyland OnBase 19.x and below - Insecure Deserialization","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-25260","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25260","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"25260","vulnerable":"1","versionEndIncluding":"16.0.2.83","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25260","vulnerable":"1","versionEndIncluding":"17.0.2.109","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25260","vulnerable":"1","versionEndIncluding":"18.0.0.32","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25260","vulnerable":"1","versionEndIncluding":"18.0.0.37","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25260","vulnerable":"1","versionEndIncluding":"19.8.16.1000","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25260","vulnerable":"1","versionEndIncluding":"19.8.9.1000","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25260","vulnerable":"1","versionEndIncluding":"20.3.10.1000","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hyland","cpe5":"onbase","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-25260","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Hyland OnBase 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. It allows remote attackers to execute arbitrary code because of unsafe JSON deserialization."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://seclists.org/fulldisclosure/2020/Sep/22","refsource":"MISC","name":"https://seclists.org/fulldisclosure/2020/Sep/22"}]}},"nvd":{"publishedDate":"2020-09-11 03:15:00","lastModifiedDate":"2022-06-30 16:25:00","problem_types":["CWE-502"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0.0.0","versionEndIncluding":"17.0.2.109","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*","versionStartIncluding":"20.0.0.0","versionEndIncluding":"20.3.10.1000","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*","versionStartIncluding":"19.0.0.0","versionEndIncluding":"19.8.16.1000","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*","versionStartIncluding":"18.0.0.0","versionEndIncluding":"18.0.0.37","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*","versionEndIncluding":"16.0.2.83","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"25260","Ordinal":"186671","Title":"CVE-2020-25260","CVE":"CVE-2020-25260","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"25260","Ordinal":"1","NoteData":"An issue was discovered in Hyland OnBase 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. It allows remote attackers to execute arbitrary code because of unsafe JSON deserialization.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"25260","Ordinal":"2","NoteData":"2020-09-10","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"25260","Ordinal":"3","NoteData":"2020-11-09","Type":"Other","Title":"Modified"}]}}}